Internet Routing Vulnerability - lacnic

Transcription

Internet Routing Vulnerability - lacnic
Internet Routing Vulnerability
Routing-based Internet Infrastructure Attacks &
Manipulations
Doug Madory
Director of Internet Analysis
LACSEC / LACNIC
Havana, Cuba
6 May 2016
Discovery of ALBA-1 Activation
•  14 January 2013: ALBA-1 began carrying Internet traffic
@DynResearch
BGP governs movement of Internet traffic
•  Single protocol governs traffic exchange among the roughly
50,000+ Autonomous Systems that make up the Internet
•  Each AS advertises their own IP networks, or prefixes, to their
peers and transit providers
Prefix: 194.123.122.0/24 (256 addresses)
ASNs: AS286 (KPN), AS1103 (SURFnet)
•  Each AS independently picks the best route to every prefix on
earth (most specific, then shortest AS path)
•  However, each AS also has the ability to announce any other
AS’s IP address space!
@DynResearch
The system that directs
Internet traffic is based
on entirely on trust
@DynResearch
BGP MITM hijacks
•  Beltelecom (AS6697)
•  Belarus incumbent hijacked multiple
entities in February 2013
•  Multiple downstream AS origins for
hijacked prefixes
•  Traceroutes pass only through
Beltelecom
•  Targeted US financial institutions and
Foreign Ministries of numerous
governments
@DynResearch
http://research.dyn.com/2013/11/mitm-internet-hijacking/
BGP MITM hijacks
trace from Helsinki to Ministry of Foreign Affairs of Lithuania
(May 23, 2013)
1 *
2 62.78.114.228 Helsinki, Finland
0.519
3 62.78.111.198 Helsinki, Finland
0.508
Legitimate route:
4 62.78.107.128 Tampere, Finland
8.669
… 13194 24825 195.22.173.0/24
5 62.78.107.135 Tampere, Finland
14.401
Ministry of Foreign
6 62.78.107.51
Tampere, Finland
8.694
Affairs of Lithuania
7 194.68.123.212 Stockholm, Sweden
21.758
8 217.150.62.234 Moscow, Russia
156.642
Beltelecom
Hijack route:
9 217.150.62.233 Minsk, Belarus
44.710
10 84.15.6.213
Vilnius, Lithuania 66.443
… 20485 6697 56498 195.22.173.0/24
11 213.226.128.18 Vilnius, Lithuania 66.613
•  Hijack route was in circulation for about 1hr
12 195.22.173.222 Ministry of Foreign 68.120
•  BGP communities used to deliberately limit
Affairs of Lithuania
propagation to create MITM
@DynResearch
http://research.dyn.com/2013/11/mitm-internet-hijacking/
Global routing system can be
(and has been) manipulated
to redirect Internet traffic
@Name Vast World of Fraudulent Routing
•  Numerous entities currently engaged in IP squatting
•  Common technique for spam generation, but also used
for distribution of malware and botnet CnC
•  Obfuscates perpetrator’s true source
•  Mostly unused IP space, but sometimes used space
@DynResearch
http://research.dyn.com/2015/01/vast-world-of-fraudulent-routing/
Dutch Minister of Foreign Affairs
questioned by member of parliament
over why their IP space was hijacked.
Dutch Minister of Foreign Affairs
@DynResearch
About 40% of our BGP peers carried this
route in their table for about two weeks.
AS62228 announced about 45 routes
of mostly unused address space.
@DynResearch
Good guys
Bad guys
@DynResearch
•  Improved Technique: Phony, but plausible AS origins
used to throw off the scent
•  Previous Russian-based activity (disappeared on Nov 5, 2014)
§  Example: British Telecom address space was originated by British
Telecom ASNs (AS5400, AS3300), but routed from Russia
•  Similar activity began in Ukraine in December 2014 and is currently
on-going
Example: 200.202.64.0/19 (Brazil Home Shopping Ltd)
@DynResearch
Example: 200.202.64.0/19 (Brazil Home Shopping Ltd)
Originated by:
Brazil Home Shopping (AS11295)
Ok, looks good
@DynResearch
Exclusively transited along following path:
AS10495
AS18739
ASNs of Brazilian entities.
Ok, still looks plausible
AS8438
AS9002
RU-ish Peers
Example: 200.202.64.0/19 (Brazil Home Shopping Ltd)
Originated by:
Brazil Home Shopping (AS11295)
Ok, looks good
Exclusively transited along following path:
AS10495
AS18739
ASNs of Brazilian entities.
Ok, still looks plausible
AS8438
RU-ish Peers
RETN (RU/UA)
Hetman Soft (UA)
Route circulated only to a limited set of (mostly Russian) carriers
@DynResearch
AS9002
•  What does a traceroute into this space look like?
Example: 200.202.64.0/19 (Brazil Home Shopping Ltd)
… 9002 8438 18739 10495 11295 200.202.64.0/19
trace from Moscow, RU to 200.202.64.1 on Oct 09,
1 *
2 87.245.229.46 ReTN external interconnections
3 87.245.233.26 ReTN's Backbone
4 *
5 200.202.64.1
BR HOME SHOPPING LTDA
trace from Minsk,
1 *
2 *
3 93.84.125.194
4 93.85.80.54
5 93.85.80.126
6 87.245.237.21
7 87.245.232.173
8 *
9 200.202.64.1
@DynResearch
2015
Moscow
Kiev
Russia
Ukraine
Belo Horizonte
Brazil
0.0
0.478
19.717
0.0
20.419
20ms from Moscow
BY to 200.202.64.1 on Oct 09, 2015
BELTELECOM
Republican Unitary Telecommunica
Republican Unitary Telecommunica
ReTN external interconnections
ReTN's Backbone
Minsk
Minsk
Minsk
Kiev
Kiev
Belarus
Belarus
Belarus
Ukraine
Ukraine
BR HOME SHOPPING LTDA
Belo Horizonte
Brazil
0.0
0.0
4.343
4.425
0.984
12.405
12.511
0.0
12.67
12ms from Minsk
•  Other examples of routes seen exclusively along 9002_8438:
Prefix
187.239.0.0/16 (Uninet, MX)
177.90.0.0/16 (Universidade De Sao Paulo, BR)
200.200.0.0/16 (Embratel, BR)
181.56.0.0/16 (Telmex Colombia, CO)
161.255.0.0/16 (Movistar (Telcel), VE)
177.21.128.0/20 (Netdigit Telecomunicacoes, BR)
196.3.16.0/20 (Net Uno, C.A., VE)
186.189.224.0/20 (FastBee Argentina S.A.)
186.236.240.0/20 (Prefeitura de Cuiabá, BR)
191.102.224.0/20 (DirecTV Colombia)
177.8.80.0/20 (Centro Int. de Telemática do Exército,BR)
Telemática do
Exército,BR)
... many more
@DynResearch
Plausible, but Phoney Origin
AS8151 (Uninet, MX)
AS28571 (Univ De Sao Paulo, BR)
AS4230 (Embratel, BR)
AS10620 (Telmex Colombia, CO)
AS6306 (Movistar (Telcel), VE)
AS28245 (Netdigit Telecomunicacoes, BR)
AS11562 (Net Uno, C.A., VE)
AS28028 (FastBee Argentina S.A)
AS263638 (Prefeitura de Cuiabá, BR)
AS262928 (DirecTV Colombia)
AS52890 (Centro Int. de
With fraudulent routing,
IP address-based attribution
becomes more difficult
@Name Traffic misdirection also still happening…
• 
@DynResearch
“But my traffic is all encrypted”
About 10% of our BGP peering carried this
route in their table for about 1.5 hrs.
Other routes persisted for over a week.
@DynResearch
@DynResearch
Security
Analyst Summit 2016
•  Less than 10% of our BGP peers carried
this route in their table for over 3 weeks.
•  Peers accepting this route were mostly in
Russia and Eurasia.
@DynResearch
• 
Normal traceroute from Minsk to E-Commerce Park:
trace from Minsk, BY to 200.124.149.208 at 03:39 Apr
1 *
2 *
3 178.124.134.50 Minsk, Belarus
4 93.84.125.162 BELTELECOM
5 93.85.80.38
Republican Unitary Telecommunica
6 93.85.80.86
Republican Unitary Telecommunica
7 62.115.50.17
TeliaSonera AB
8 62.115.135.182 TeliaSonera AB
9 213.155.131.251TeliaSonera International Carrie
10 62.115.143.161 TeliaSonera AB
11 213.248.86.86 TeliaSonera International Carrie
12 63.245.5.99
Columbus Networks IP TRANSIT
13 190.242.16.46 Columbus Networks de Colombia Li
14 200.124.149.208 E-Commerce Park Client
• 
01, 2015
Minsk
Minsk
Minsk
Minsk
Warsaw
Hamburg
Ashburn
Miami
Miami
Miami
Miami
Willemstad
Belarus
Belarus
Belarus
Belarus
Poland
Germany
United States
United States
United States
United States
United States
Curaçao
0.0
0.0
0.523
3.774
2.666
0.685
9.321
24.525
111.956
137.903
161.535
156.278
192.110
189.779
Traceroute during routing hijack:
trace from Minsk,
1 *
2 *
3 178.124.134.50
4 93.84.125.162
5 93.85.80.38
6 93.85.80.66
7 85.26.172.42
8 200.124.149.208
@DynResearch
BY to 200.124.149.208 at 01:16 May 08, 2015
Minsk, Belarus
BELTELECOM
Republican Unitary Telecommunica
Republican Unitary Telecommunica
Volga Branch of OJSC MegaFon
E-Commerce Park Client
Minsk
Minsk
Minsk
Minsk
Moscow
Willemstad
Belarus
Belarus
Belarus
Belarus
Russia
Curaçao
0.0
0.0
0.551
1.427
5.258
0.688
13.359
238.075
New path
through
Megafon in
Moscow
@DynResearch
@DynResearch
AT&T Hijack of BetCRIS on 12-Jan
§ 
§ 
§ 
Online gambling operation
Hosted in Costa Rica
Frequent Target of US Law Enforcement
§ 
Route hijacked by AT&T hours before FBI
files indictment of ODOG Enterprises
Traffic redirected to AT&T in Europe
§ 
A simple router misconfig?
§ 
@DynResearch
• 
• 
What to do? No silver bullet.
Mutually Agreed Norms for Routing Security (MANRS)
• 
• 
• 
Effort by Internet Society
Collection of Best Practices for Operators
Effective route monitoring
@DynResearch
Summary
• 
Global Internet routing is vulnerable to manipulation
• 
Hijacks and routing errors can (and do) misdirect traffic
• 
Fraudulent BGP routing occurring at a near constant pace
• 
Attribution based on IP addresses and reputation based on ASN are
not so simple
• 
Enterprises and ISPs would do well to monitor their routes
@DynResearch
THANK YOU!
Doug Madory
[email protected]
@dynresearch
@Name Extra slides
@DynResearch
@DynResearch